Learn how to configure the syslog daemon on your Linux system and how to send log output to a central log server or accept log output as a central log server. Learn about the systemd journal subsystem and rsyslog and syslog-ng as alternative logging systems. Use the material in this tutorial to study for the LPI 102 exam for Linux system administrator certification or to learn for fun.

This article is about high availability or disaster recovery and fail-over for Linux on Power virtual machines (VMs) or logical partitions (LPARs). The solution works for all Linux distributions available for IBM POWER8 and later processor-based servers. Open source software used in this solution are: DRBD and heartbeat, which are available for all supported distributions. We have used Ubuntu v16.04, supported on IBM Power servers to explain and verify the solution.

Scylla is an open source NoSQL database that is compatible with Apache Cassandra. Scylla offers several key advantages over Cassandra such as scalability and better performance. Scylla was tested with IBM POWER8 processor-based servers and superior throughput and latency was achieved with both database read and write operations. This article describes the tests that were done with IBM POWER processor-based servers, the performance results, and the value of IBM POWER processor-based servers for Scylla.

Learn how to set your Linux system clock and synchronize your time with an Internet NTP time server. You can use the material in this tutorial to study for the LPI 102 exam for Linux system administrator certification or to learn for fun.

This article provides a list of ISV solutions that can augment the capabilities of Hortonworks Data Platform (HDP) running on Linux on IBM Power Systems. Solutions cover many categories including business intelligence (BI) tools, advanced analytics, and so on.

This article describes the details behind the new software-defined converged infrastructure for deploying SAS Foundation Mixed Analytics workloads using IBM Elastic Storage Server (ESS), IBM Spectrum Scale, IBM POWER8, and Mellanox networking technology. This article documents detailed test configurations, test scenarios, performance results, and tuning options for the converged infrastructure. This article provides a methodology to tune each component in the infrastructure horizontally, as well as tuning the solution vertically, which allowed the optimal performance to be achieved.

This article describes how to set up an environment where SAP HANA accesses and analyzes data stored in Hortonworks Data Platform (HDP) using the SAP HANA Spark Controller. The environment is running entirely on IBM POWER8 processor-based servers. This article describes two deployment options that use either scale-up or scale-out POWER8 servers.

OpenWhisk has significantly gained popularity as the cloud-first distributed event-based programming service. In this article, we discuss about the enablement of OpenWhisk for IBM Power servers. It also provides the configurations needed to start an OpenWhisk cluster in an all-in-one Ubuntu cluster running on IBM Power Architecture.

This article describes the approaches for backing up MongoDB instances on IBM Power Systems. It includes instructions on how to run backup and management agents on the MongoDB servers and how MongoDB can be integrated with traditional backup tools such as IBM Spectrum Protect.

IBM Power Virtualization Center (PowerVC) is an OpenStack-based IaaS cloud solution for the IBM Power platform designed to simplify the management of virtual resources. PowerVC consists of both a GUI and RESTful APIs that perform virtual management tasks for your Power System. This article highlights the REST APIs for both PowerVC Standard Edition and Cloud PowerVC Manager.

This article illustrates the methodology to offload the part of computations to GPU without refactoring the applications. The Crossroads/NERSC-9 Memory Bandwidth benchmark is used to showcase the offload of dense matrix multiplication (DGEMM) computations on GPU by linking (compile time) the newer version of CUDA-enabled ESSL (IBM Scientific Library). The use of CUDA-enabled ESSL gives approximately six times performance gain over CPU-only code.

Use this roadmap to find IBM developerWorks tutorials that help you learn and review basic Linux tasks. And if you're also pursuing professional certification as a Linux system administrator, these tutorials can help you study for the Linux Professional Institute's LPIC-1: Linux Server Professional Certification exam 101 and exam 102. This roadmap is organized according to the 43 objectives in the 101 and 102 exams, which you are required to pass for LPIC-1 certification.

Learn how to use locale and time zone settings to put your Linux system in the right time and place. You can use the material in this tutorial to study for the LPI 102 exam for Linux system administrator certification or to learn for fun.

Build a Docker container that uses WebSockets to expose an existing Linux CLI chess engine as a cloud service. This tutorial shows step-by-step the process for building a Docker container and deploying it as a running container on IBM Containers for Bluemix. It includes sample code and a JavaScript chess game that runs in a browser and illustrates how to consume the WebSocket-based service. You can apply the methods demonstrated to containerize almost any pipe-based Linux application and leverage them as cloud services on Bluemix.

This article describes how to set up an environment where SAS can access and analyze data stored on Hortonworks Data Platform (HDP) using SAS/ACCESS Interface to Hadoop. The environment is running on IBM POWER8 processor-based servers.

Monitoring IT infrastructure is essential to ensure its stability. Choosing an efficient, scalable, customizable, and light-weight solution for this has always been a challenge with changing requirements. Custom scripts can be used to achieve this smartly unlike the agent-based monitoring method in which all data defaulted by the monitoring tool used will be collected. This article describes the custom script method for monitoring system resources. In this method, the data collector(s) scripts running on data collector node will poll the target systems for data and so can decide on what data to be pulled.

Protection of system firmware against malicious attack is paramount to server security. If an attacker is able to inject malicious code at the firmware level, no security measure at the operating system level can fully guarantee the trust of the system. IBM OpenPOWER servers support secure boot of system firmware to ensure the system boots only authorized firmware. When the system boots, each firmware component is verified against a cryptographic signature and integrity-checked against a secure hash of the component. If any check fails, secure boot prevents the system from booting until the problem is corrected.

Learn how to check the integrity of your Linux filesystems, monitor free space, and fix simple problems. Use the material in this tutorial to study for the Linux Professional Institute (LPI) 101 exam for Linux system administrator certification -- or just to check your filesystems and keep them in good working order, especially after a system crash or power loss.

STAF and LTP is a widely used regression test combination to validate the behavior of Linux kernel and glibc components. This article describes how to build a STAF and LTP Docker image. By using this image, you can create containers that test the Linux kernel and glibc components.

This article describes how to quickly and easily install and configure EnterpriseDB Postgres Advanced Server with Linux on Power architecture, namely RHEL 7.2 LE. Although it is targeted towards customers who have eligible dark core resources on IBM Power Enterprise Servers, the installation instructions are valid for most IBM Power servers.

This article is a quick reference guide for IBM Power System S822LC for high-performance computing (HPC) system users to set processor and GPU configuration to achieve best performance for GPU accelerated applications. Before running an application, users need to make sure that the system is performing to the best in terms of processor frequency and memory bandwidth, GPU compute capacity, and memory bandwidth.

The Digital Business Start for Hortonworks Data Platform (HDP) trial offer is for customers who have IBM® Power Enterprise Servers in their environment and want to enable inactive cores and memory to deploy HDP on RHEL 7.2 LE. This guide walks you through the setup steps.

The Digital Business Start trial offer is for customers who have IBM® Power Enterprise Servers in their environment and want to enable inactive cores and memory to deploy MongoDB on a Linux operating system (OS). This guide walks you through the setup steps.

This article describes private cloud deployment with OpenStack and Linux on IBM Power System LC servers that are running KVM. This article also explains the deployment of Hortonworks Data Platform (HDP) using OpenStack.

Neo4j on IBM Power Systems running Linux is an ideal solution for managing big data workloads. In this article, you can learn how to install Neo4j and begin using it with your application and data set today.

About a week ago, IBM launched Quantum Experience. The cornerstone of this initiative is to make a real, working quantum computer available for anyone. This blog discusses Quantum Experience, gives the basics while trying to dwell as little as possible on Algebra or Physics and, at the end, we’ll build a simple algorithm and discuss the results.

IBM OpenPOWER servers provide a firmware level security feature known as Trusted Boot. Trusted Boot helps defend against a boot code cyberattack by helping to verify that your server is running only authorized firmware. Integrity of your firmware is vital to the security of your system. Trusted Boot works by taking measurements of the executable boot code as the server boots and recording these measurements to a dedicated hardware security module known as the Trusted Platform Module (TPM). Together with a process known as remote attestation, you can use the data in the TPM to verify the integrity of your server's boot code.

Learn how to set up your computer hardware for Linux and how to find information about your hardware via Linux commands and tools. You can use the material in this tutorial to study for the LPI 101 exam for Linux system administrator certification, or to learn for fun.

This article demonstrates how Perf annotate can be used to analyze performance details alongside actual code with their assembly instructions. It also describes how the new cross-architecture annotation can be used to analyze recorded profile on different architecture, for example, record data on IBM PowerPC server and annotate on your notebook or x86 system.

In an actual production environment, our customers often have a complicated application running environment that includes a hybrid architecture, a hybrid distributed system, and so on. Also, our customers prefer a unified container cloud platform and always use Kubernetes as a framework of Mesos. This article can help you to set up Kubernetes on a Mesos cluster on a hybrid architecture.

Use this tutorial to install Ubuntu on an IBM Power System LC server using several different methods, including USB device, virtual wizard, or network boot installation. This installation is specifically for installing Ubuntu on an IBM Power System S812 LC or S822 LC (OpenPOWER) server, but can be easily adapted to a different Power System LC server.

In a world where securing your computer systems is more difficult than ever, there are steps you can take to protect them. This article includes tips and tools to help you harden and secure your Linux servers by using processes such as sane configurations, fuzz testing and penetration testing.

EnterpriseDB EDB Postgres Advanced Server 9.5 on IBM Power Systems running Linux is an ideal solution for managing business critical workloads. Learn how to install Postgres Advanced Server 9.5 and begin by using it with your application and data set today.

To build web applications that act in concert securely, use the docker networks feature. Networks, by definition, provide complete isolation for containers. Hence, it is important to have control on the networks that your applications run on. Docker container networks give you that control. The following article describes describes the type of networks that the docker engine creates by default and shows you how to create your own, user-defined networks.